|
Conference
|
2025 |
The Advent of the AI Era and the Future of Digital Identity
진승헌
한국정보기술학회 종합 학술 대회 (추계) 2025, pp.170-174 |
|
|
|
Conference
|
2025 |
A Study on the Integration of Passwordless Authentication in Zero Trust Architecture (ZTA) Environments
진승헌
한국정보보호학회 학술 대회 (하계) 2025, pp.677-680 |
|
|
|
Journal
|
2025 |
The Evolution of Authentication and its Paradigm Transformation
진승헌
정보와 통신: 한국통신학회지, v.46, no.7, pp.53-61 |
|
|
|
Journal
|
2024 |
Cybersecurity Technology in the Age of AI
진승헌
주간기술동향, v.2160, pp.2-16 |
|
|
|
Conference
|
2024 |
An Integrated Perspective on the Definition of AI Security
진승헌
한국정보기술학회 종합 학술 대회 (추계) 2024, pp.123-126 |
|
|
|
Conference
|
2024 |
A Study on Mapping Digital Identities between EU and US
진승헌
한국정보기술학회 종합 학술 대회 (하계) 2024, pp.91-95 |
|
|
|
Journal
|
2024 |
EU eIDAS 2.0 & European Digital Identity Wallet
진승헌
TTA Journal, v.211, pp.90-95 |
|
|
|
Conference
|
2023 |
Evolution of digital wallets and consideration of security threats
진승헌
한국정보보호학회 학술 대회 (하계) 2023, pp.1-4 |
|
|
|
Journal
|
2022 |
Review for ID management technology according to Metaverse phase
정수용
정보보호학회지, v.32, no.4, pp.49-59 |
|
|
|
Conference
|
2022 |
A Study on Metaverse Security Threats
진승헌
한국정보보호학회 학술 대회 (하계) 2022, pp.699-702 |
|
|
|
Conference
|
2021 |
Major Issues and Implications for 20 Years of Accredited Certificate
진승헌
한국정보기술학회 종합 학술 대회 (추계) 2021, pp.16-20 |
|
|
|
Journal
|
2021 |
World Without Boundaries and Trends in User Authentication Technology
진승헌
전자통신동향분석, v.36, no.4, pp.135-144 |
|
|
|
Conference
|
2021 |
Analysis of Digital ID Management Technology Requirements for the Post-COVID-19 Er
진승헌
한국정보기술학회 종합 학술 대회 (하계) 2021, pp.24-28 |
|
|
|
Journal
|
2020 |
Trends of Digital Identity Technology
진승헌
주간기술동향, v.1975, pp.2-13 |
|
|
|
Journal
|
2020 |
Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique
Sung-Hoon Lee
IEEE Access, v.8, pp.83248-83264 |
5 |
|
|
Journal
|
2019 |
Mobile Network Security Issues regarding 5G Security
박종근
전자통신동향분석, v.34, no.1, pp.36-48 |
|
|
|
Conference
|
2018 |
AppWrapper: Patching Security Functions with Dynamic Policy on Your Insecure Android Apps
Sung-Hoon Lee
International Symposium on Software Reliability Engineering Workshops (ISSREW) 2018, pp.36-41 |
2 |
|
|
Journal
|
2018 |
Detection of Spoofing Attacks in Face Recognition
이성훈
주간기술동향, v.1870, pp.17-26 |
|
|
|
Conference
|
2018 |
Learning based Biometric Key Generation Method using CNN and RNN
Jong-hyuk Roh
International Conference on Information Technology and Electrical Engineering (ICITEE) 2018, pp.136-139 |
12 |
|
|
Journal
|
2018 |
Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment
Sung-Hoon Lee
Journal of Information Processing Systems, v.14, no.2, pp.523-538 |
9 |
|
|
Journal
|
2018 |
Trends in Implicit Continuous Authentication Technology
김승현
전자통신동향분석, v.33, no.1, pp.57-67 |
|
|
|
Conference
|
2017 |
Appwrapping Providing Fine-Grained Security Policy Enforcement Per Method Unit in Android
Sung-Hoon Lee
International Symposium on Software Reliability Engineering Workshops (ISSREW) 2017, pp.36-39 |
4 |
|
|
Journal
|
2017 |
Constructing a Privacy-Protecting Fingerprint-Template Based on a Combination of Encryption
김형균
한국정보기술학회논문지, v.15, no.10, pp.45-53 |
|
|
|
Conference
|
2017 |
A Study of Adaptive Feature Subset for Improving Accuracy of Keystroke Dynamics Authentication on Mobile Environment
이성훈
한국정보처리학회 학술 발표 대회 (춘계) 2017, pp.287-290 |
|
|
|
Journal
|
2017 |
모바일 보안 관리 기술 소개 및 동향
이성훈
주간기술동향, v.1791, pp.2-12 |
|
|
|
Journal
|
2017 |
Simplified Small Exponent Test for Batch Verification
Jung Yeon Hwang
Theoretical Computer Science, v.662, pp.48-58 |
15 |
|
|
Conference
|
2016 |
A Study of App Wrapping for Repackaging Android Binary Application
이성훈
한국정보보호학회 학술 대회 (동계) 2016, pp.1-4 |
|
|
|
Conference
|
2016 |
Efficient Fuzzy Key Extraction Method with Lighted Template
김형균
한국정보보호학회 학술 대회 (동계) 2016, pp.1-4 |
|
|
|
Conference
|
2016 |
A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment
Sung-Hoon Lee
World Conference on Information Security Applications (WISA) 2016 (LNCS 10144), v.10144, pp.1-10 |
2 |
|
|
Journal
|
2016 |
핀테크 보안 기술 동향 : 상황 인지 기반 인증 기술
김승현
정보과학회지, v.34, no.4, pp.20-24 |
|
|
|
Conference
|
2015 |
Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures
Jung Yeon Hwang
International Conference on Security Standardisation Research (SSR) 2015, v.9497, pp.43-69 |
5 |
|
|
Journal
|
2015 |
Customer Data Scanner for Hands-Free Mobile Payment
SooHyung Kim
IEICE Transactions on Communications, v.E98-B, no.11, pp.2291-2299 |
0 |
|
|
Journal
|
2015 |
Study on Fintech Technology and Its Security
이성훈
전자통신동향분석, v.30, no.4, pp.110-119 |
|
|
|
Journal
|
2015 |
An Attack of Defeating Keyboard Encryption Module using Javascript Manipulation in Korean Internet Banking
이성훈
정보보호학회논문지, v.25, no.4, pp.941-950 |
|
|
|
Conference
|
2015 |
Accurate Indoor Proximity Zone Detection Based on Time Window and Frequency with Bluetooth Low Energy
Dae-Yeob Kim
International Conference on Mobile Systems and Pervasive Computing (MobiSPC) 2015, pp.88-95 |
|
|
|
Conference
|
2014 |
Risk of Personal Information for the Sale of Used Goods in the Online
박준범
한국정보처리학회 학술 발표 대회 (추계) 2014, pp.482-485 |
|
|
|
Journal
|
2014 |
Passwordless Authentication Technology-FIDO
조상래
전자통신동향분석, v.29, no.4, pp.101-109 |
|
|
|
Conference
|
2014 |
Implementation of TouchSign Certificate Management System
조상래
대한전자공학회 종합 학술 대회 (하계) 2014, pp.598-601 |
|
|
|
Conference
|
2014 |
The Research on iBeacon Technology Trend and Issue
김대엽
한국 컴퓨터 종합 학술 대회 2014, pp.390-392 |
|
|
|
Conference
|
2014 |
Implementation of TouchSign Online System
김수형
대한전자공학회 종합 학술 대회 (하계) 2014, pp.595-597 |
|
|
|
Conference
|
2014 |
Implementation of TouchSign Offline Digital Signature System
조영섭
대한전자공학회 종합 학술 대회 (하계) 2014, pp.602-605 |
|
|
|
Conference
|
2014 |
The Effective De-Identification using Quasi-Identifier in the Relational Database
박준범
한국정보보호학회 학술 대회 (하계) 2014, pp.1-4 |
|
|
|
Conference
|
2014 |
Device Control Protocol Using Mobile Phone
Jong-hyuk Roh
International Conference on Advanced Communication Technology (ICACT) 2014, pp.355-359 |
15 |
|
|
Journal
|
2013 |
A Method of Identifying Ownership of Personal Information Exposed in Social Network Service
김석현
정보보호학회논문지, v.23, no.6, pp.1103-1110 |
|
|
|
Conference
|
2013 |
A Method to Convert Formalized Hangul Name of Informal User Name
김석현
한국정보과학회 학술 발표회 (추계) 2013, pp.799-801 |
|
|
|
Conference
|
2013 |
Privacy Protection Technology for Public Information Open & Sharing
최대선
한국정보과학회 학술 발표회 (추계) 2013, pp.775-777 |
|
|
|
Conference
|
2013 |
Connecting Same ID in the Facebook and Twitter
박준범
한국정보과학회 학술 발표회 (추계) 2013, pp.778-780 |
|
|
|
Conference
|
2013 |
Named Entity Recognition with Automatically Gathered Training Data
조진만
한국정보과학회 학술 발표회 (추계) 2013, pp.772-774 |
|
|
|
Conference
|
2013 |
Geo-Location based QR-Code Authentication Scheme to Defeat Active Real-time Phishing Attack
Seung-Hyun Kim
Workshop on Digital Identity Management (DIM) 2013, pp.51-61 |
11 |
|
|
Journal
|
2013 |
Personal Information Exposure on Social Network Service
최대선
정보보호학회논문지, v.23, no.5, pp.977-983 |
|
|